ID

VAR-201906-0300


CVE

CVE-2019-1876


TITLE

Cisco Wide Area Application Services Vulnerability related to lack of authentication for critical functions in software

Trust: 0.8

sources: JVNDB: JVNDB-2019-005778

DESCRIPTION

A vulnerability in the HTTPS proxy feature of Cisco Wide Area Application Services (WAAS) Software could allow an unauthenticated, remote attacker to use the Central Manager as an HTTPS proxy. The vulnerability is due to insufficient authentication of proxy connection requests. An attacker could exploit this vulnerability by sending a malicious HTTPS CONNECT message to the Central Manager. A successful exploit could allow the attacker to access public internet resources that would normally be blocked by corporate policies. An attacker can exploit this issue to bypass the authentication mechanism and gain unauthorized access. This may lead to further attacks. This issue is tracked by Cisco Bug ID CSCvo13639. This software is mainly used in the link environment with small bandwidth and large delay

Trust: 1.98

sources: NVD: CVE-2019-1876 // JVNDB: JVNDB-2019-005778 // BID: 108863 // VULHUB: VHN-151138

AFFECTED PRODUCTS

vendor:ciscomodel:wide area application servicesscope:eqversion:5.5\(7\)

Trust: 1.0

vendor:ciscomodel:wide area application servicesscope:eqversion:6.4\(3b\)

Trust: 1.0

vendor:ciscomodel:wide area application servicesscope:eqversion:6.1\(1\)

Trust: 1.0

vendor:ciscomodel:wide area application services softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:wide area application services softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:wide area application services appliances 6.4scope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application services appliancesscope:eqversion:6.1(1)

Trust: 0.3

vendor:ciscomodel:wide area application services appliancesscope:eqversion:5.5(7)

Trust: 0.3

sources: BID: 108863 // JVNDB: JVNDB-2019-005778 // NVD: CVE-2019-1876

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1876
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1876
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-1876
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201906-807
value: MEDIUM

Trust: 0.6

VULHUB: VHN-151138
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1876
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-151138
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1876
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.8

ykramarz@cisco.com: CVE-2019-1876
baseSeverity: MEDIUM
baseScore: 4.0
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-151138 // JVNDB: JVNDB-2019-005778 // CNNVD: CNNVD-201906-807 // NVD: CVE-2019-1876 // NVD: CVE-2019-1876

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.9

sources: VULHUB: VHN-151138 // JVNDB: JVNDB-2019-005778 // NVD: CVE-2019-1876

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201906-807

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201906-807

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-005778

PATCH

title:cisco-sa-20190619-waas-authbypassurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190619-waas-authbypass

Trust: 0.8

title:Cisco Wide Area Application Services Software Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93956

Trust: 0.6

sources: JVNDB: JVNDB-2019-005778 // CNNVD: CNNVD-201906-807

EXTERNAL IDS

db:NVDid:CVE-2019-1876

Trust: 2.8

db:BIDid:108863

Trust: 2.0

db:JVNDBid:JVNDB-2019-005778

Trust: 0.8

db:CNNVDid:CNNVD-201906-807

Trust: 0.7

db:AUSCERTid:ESB-2019.2209

Trust: 0.6

db:VULHUBid:VHN-151138

Trust: 0.1

sources: VULHUB: VHN-151138 // BID: 108863 // JVNDB: JVNDB-2019-005778 // CNNVD: CNNVD-201906-807 // NVD: CVE-2019-1876

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190619-waas-authbypass

Trust: 2.0

url:http://www.securityfocus.com/bid/108863

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-1876

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1876

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.2209/

Trust: 0.6

sources: VULHUB: VHN-151138 // BID: 108863 // JVNDB: JVNDB-2019-005778 // CNNVD: CNNVD-201906-807 // NVD: CVE-2019-1876

CREDITS

Cisco

Trust: 0.9

sources: BID: 108863 // CNNVD: CNNVD-201906-807

SOURCES

db:VULHUBid:VHN-151138
db:BIDid:108863
db:JVNDBid:JVNDB-2019-005778
db:CNNVDid:CNNVD-201906-807
db:NVDid:CVE-2019-1876

LAST UPDATE DATE

2024-11-23T22:48:22.854000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-151138date:2019-10-09T00:00:00
db:BIDid:108863date:2019-06-19T00:00:00
db:JVNDBid:JVNDB-2019-005778date:2019-06-28T00:00:00
db:CNNVDid:CNNVD-201906-807date:2019-06-28T00:00:00
db:NVDid:CVE-2019-1876date:2024-11-21T04:37:35.670

SOURCES RELEASE DATE

db:VULHUBid:VHN-151138date:2019-06-20T00:00:00
db:BIDid:108863date:2019-06-19T00:00:00
db:JVNDBid:JVNDB-2019-005778date:2019-06-28T00:00:00
db:CNNVDid:CNNVD-201906-807date:2019-06-19T00:00:00
db:NVDid:CVE-2019-1876date:2019-06-20T03:15:12.167